iWelcome Blog
259 FOLLOWERS
iWelcome provides Identity & Access Management as a service (IDaaS). With iWelcomes cloud platform, organizations manage the identity lifecycle and access of their consumers, employees, business customers, partners and suppliers in a simple, secure and efficient manner.
iWelcome Blog
1y ago
A few weeks ago, I visited KuppingerCole’s European Identity and Cloud Conference, the leading Identity conference in Europe with 1.000 (!) attendees. The wide variety of the program and the conversations I had were clear about one thing: Identity Management is more and more about enabling business rather than supporting internal IT, and therefore also more and more fun. These are the most important trends that I spotted ..read more
iWelcome Blog
1y ago
In a series of two blog posts, Andrei Sfat (Developer at iWelcome) shares his thoughts and some useful tips and tricks on the use of online passwords.
*Updated September 2020  ..read more
iWelcome Blog
1y ago
In this blog, Arie Timmerman, Technical Consultant at iWelcome, shares four key topics to take into consideration when implementing cloud versus on-premise Consumer Identity and Access Management (CIAM) solutions ..read more
iWelcome Blog
1y ago
I’m a big fan of Scandinavian TV shows. The Swedish sci-fi drama ‘Real Humans’ is one of my favourites. It was released a few years ago and it’s based on a near future world, where human robots (hubots) have become an everyday phenomenon. In a world where technology is so advanced, the boundaries between human and machine become blurry. New questions arise - should these human robots be paid for the work they do? Who is responsible for their actions in case things go wrong? Should hubots get a legal status of their own, and legal rights to go with that ..read more
iWelcome Blog
1y ago
This is the sixth in a series of nine blog posts on how Consumer Identity and Access Management (CIAM) products can help organisations in their Compliance with the General Data Protection Regulation (GDPR). This blog is part of a series that touches on important topics for CIAM experts who have an interest in the new EU regulation. This week’s topic is about ‘privacy by design’ – resulting in default protection of personal data ..read more
iWelcome Blog
1y ago
In this blog, Derk Tegeler (Security Officer at iWelcome) shares his thoughts and possible mitigation measures for two major vulnerabilities that hit the news earlier this month: Meltdown and Spectre. Just a heads-up: this article contains technical security information ..read more
iWelcome Blog
1y ago
This is the ninth in a series of nine blog posts on how Consumer Identity and Access Management (CIAM) products can help organisations in their Compliance with the General Data Protection Regulation (GDPR). This blog is part of a series that cover important topics for CIAM experts who have an interest in the new EU regulation. The topic is 'Children's privacy under GDPR ..read more
iWelcome Blog
2y ago
Being an economist, I look at the developments of the usage of 3rd party digital identities as a two-sided market or two-sided network. In a two-sided market there are two distinct user groups. Members of one group exhibit a preference regarding a high number of users in the other group - this is referred to as cross-side network effects ..read more
iWelcome Blog
2y ago
Digital native generations are reaching an age at which most have an income and start to become a powerful consumer. That makes them thé target audience for a large number of organisations all competing for the cash and business of these generation's individuals ..read more
iWelcome Blog
2y ago
Identity & Access Management policies date back to the pre-digital era, when physical information used to be guarded by perimeter protocols and restrictions. These ensured that assets would only be accessed, viewed and handled after passing all restrictions, usually in the form of guards, restricted areas, badges or copy limitations ..read more